Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits., and . ICIS, page 161-170. Association for Information Systems, (1992)Security, Privacy and a Trusted Information Intermediary: A Compensation Model and Markets for Private Information., , and . AMCIS, page 177. Association for Information Systems, (2004)Product Assortment Decisions for a Network of Retail Stores using Data Mining with Optimization., , and . KDIR, page 319-323. SciTePress, (2012)Risk Management and Optimal Pricing in Online Storage Grids., , , and . Inf. Syst. Res., 22 (4): 756-773 (2011)Interval Protection of Confidential Information in a Database., , and . INFORMS J. Comput., 10 (3): 309-322 (1998)Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection., , and . INFORMS J. Comput., 22 (3): 471-481 (2010)Access Path Optimization in Relational Joins., , and . INFORMS J. Comput., 7 (3): 257-268 (1995)Cascade Graphs: Design, Analysis and Algorithms for Relational Joins., , and . INFORMS J. Comput., 13 (1): 2-28 (2001)No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues., , , and . HICSS, page 200. IEEE Computer Society, (2003)New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms., , and . HICSS, IEEE Computer Society, (2006)